General

  • Target

    anyconnect.exe

  • Size

    1.5MB

  • Sample

    211123-d6npbscdc2

  • MD5

    f041e55b11f1d939f677eb75335508e4

  • SHA1

    4ff92238f64eb6db2c1999ab4d118cbdeaa015be

  • SHA256

    b12ae13c5cb365093ff32003c655cdff43713641be01ec07c8231836f7bb4192

  • SHA512

    b0faff5d3b43522c7a1a9c46f28bc5be4a3f0c9c6f8f3255217fb51a3081e4f9eaabb2e2c07fdf724da8eadf3cfe8487c8ae0f37bb98c9c691b7d32d82f12592

Malware Config

Extracted

Family

remcos

Version

3.3.2 Pro

Botnet

anyconnect

C2

207.32.216.106:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    true

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    anyc

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-Y7MBNM

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Targets

    • Target

      anyconnect.exe

    • Size

      1.5MB

    • MD5

      f041e55b11f1d939f677eb75335508e4

    • SHA1

      4ff92238f64eb6db2c1999ab4d118cbdeaa015be

    • SHA256

      b12ae13c5cb365093ff32003c655cdff43713641be01ec07c8231836f7bb4192

    • SHA512

      b0faff5d3b43522c7a1a9c46f28bc5be4a3f0c9c6f8f3255217fb51a3081e4f9eaabb2e2c07fdf724da8eadf3cfe8487c8ae0f37bb98c9c691b7d32d82f12592

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks